A technique for cryptographic strength selection for at least one application is provided, in accordance with a framework for providing cryptographic support of the at least one application. Data encryption is performed at a first cryptographic strength when the at least one application is privileged to perform encryption at a first cryptographic strength. Data encryption is performed at a second cryptographic strength when the at least one application is not privileged to perform encryption at the first cryptographic strength. The first cryptographic strength is stronger than the second cryptographic strength.

 
Web www.patentalert.com

< Inherited role-based access control system, method and program product

< Methods and arrangements for limiting access to computer controlled functions and devices

> Functional pattern logic diagnostic method

> Importing and exporting markup language data in a spreadsheet application document

~ 00284